Sciweavers

2615 search results - page 479 / 523
» Predictive Hebbian Learning
Sort
View
CIDR
2009
157views Algorithms» more  CIDR 2009»
15 years 28 days ago
SCADS: Scale-Independent Storage for Social Computing Applications
Collaborative web applications such as Facebook, Flickr and Yelp present new challenges for storing and querying large amounts of data. As users and developers are focused more on...
Michael Armbrust, Armando Fox, David A. Patterson,...
CRITIS
2009
15 years 28 days ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
ICASSP
2010
IEEE
15 years 1 days ago
Acoustic model adaptation via Linear Spline Interpolation for robust speech recognition
We recently proposed a new algorithm to perform acoustic model adaptation to noisy environments called Linear Spline Interpolation (LSI). In this method, the nonlinear relationshi...
Michael L. Seltzer, Alex Acero, Kaustubh Kalgaonka...
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
15 years 6 hour ago
Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization
Minimizing the rank of a matrix subject to constraints is a challenging problem that arises in many applications in control theory, machine learning, and discrete geometry. This c...
Benjamin Recht, Weiyu Xu, Babak Hassibi
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 12 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh